Online Bachelor of Science in Cyber Security Degree

The objective of the online Cyber Security degree program is to provide students with the knowledge and skills to enter the workforce and advance in professional cyber security or information security roles. Required coursework builds a foundation and broad base of skills in network protocols, advanced security concepts and operating systems and system architecture. Courses are aligned to the Network+, Security+ and CISSP industry-standard certifications.

THE IMPORTANCE OF CYBERSECURITY DEGREES

Cybersecurity is one of the most important security components in society today. The need for new, qualified cybersecurity specialists may even be greater than you might expect. The following are common security issues in various business sectors in the U.S.

Healthcare

Healthcare, one of the largest employment fields in the country, has fallen victim to continuous cyber attacks in recent years. During each of these security breaches, countless people may have been affected when their personal data was exploited. Attacks occur within industries and companies of all sizes, and the simple truth is any computer system connected to the internet can be vulnerable to attack.

Consumer Banking

Another field affected by frequent security breaches in the last decade is consumer banking. Organizations that offer banking services to the public may constantly need cybersecurity experts to help safeguard their systems from financial predators. The implementation of information security experts in the banking field can help protect banks and financial institutions from unwanted attacks, which can increase their quality of service to customers.

Websites

Websites of businesses, personal social media accounts and even individual storage clouds have also been breached through cyber attacks. As common websites and social media giants grow more secure using updates and software, hackers typically follow closely behind them. The job of the cybersecurity specialist may be to stay steps ahead of cyber attackers to protect the organizations in which they are employed. Hackers can gain access to personally identifying information through viruses and malware placed in downloads, emails and infected websites.

The work of a cyber criminal can be very technologically advanced and sophisticated. The best weapon to defend against attacks and breaches may be educated and experienced cybersecurity specialists. Through online cybersecurity programs such as our Bachelor of Science in Cybersecurity, you can learn methods to help identify potential risks and thwart breaches by cyber criminals. This degree program can also help you learn about software updates, security programs and personal methods for protecting computer information systems from cyber attacks. As technology continues to advance, the need for educated and dedicated cybersecurity specialists may continue to rise.

This degree program can help you gain the skills necessary to administer safety tools and procedures on computer information systems and other technological devices in an effort to keep private information out of the hands of those with malicious intentions.

Degree programs related to this field may contain similar courses or other elements, making it difficult for you to make the right decision for your future. In this degree comparison, we will take a look at the Bachelor of Science in Cyber Security and Bachelor of Arts in Criminal Justice (with a concentration in Computer Forensic Investigation) to help you highlight the benefits of choosing either path.

Online Cyber Security Bachelor's Degree Topics

If you are familiar with innovative technologies, social media, and online banking, you know that Cyber Security is a huge concern. People rely on the internet to stay in touch and conduct business. People just like you are using personal and business emails important communications and utilizing websites to manage their finances and personal documents. There are people all around the world that have learned ways to access your personal identifying information and use it in fraudulent ways. This has increased the need for knowledgeable professionals to implement safeguards to protect people from these invasive attacks. One great way for you to learn more about what is involved in this degree program is reviewing the curriculum. We have placed a few example courses below to help you identify some of the topics you could take part in throughout this program.

Intro to Information Systems Security

In this day and age, you may find that there is an abundance of safety and security tools for use on computer information systems. This course may begin introducing you to the evolution of information security, as well as look into common security measures used today. The goal of this course is to provide you with enough information in current information security tactics to jumpstart your knowledge of available innovative new security measures.

Disaster Recovery

As a Cyber Security expert, there may be times that you are forced to intervene after damage has already been done. Some of the skills that you can learn from this course include those relating to general risk assessments, the analysis of damage incurred by cyber-attacks, and the implementation of improvement plans to both correct damage done and prevent future occurrences of attacks.

Online Bachelor of Arts in Criminal Justice (concentration in Computer Forensic Investigation)

There are many different subfields of Cyber Security that can be great options for you depending on your interests. One of the most compared degree programs for people interested in Cyber Security is our Bachelor of Arts in Criminal Justice with a concentration in Computer Forensic Investigation. While this degree program is not directly related to securing information systems for private or commercial use, it does require you to have a diverse understanding of computer and network operating systems in order to investigate or research criminal behavior.

A Computer Forensic Investigation degree program can help you learn methods of retrieving data and information from damaged technological devices and gathering electronic evidence for use in criminal proceedings. If you would like to learn more about specific roles or responsibilities in this field in comparison to Cyber Security, take a look at some of the courses listed below:

Search and Seizure of Digital Evidence

In Computer Forensic Investigation, you must take all of the necessary legal and ethical precautions necessary to protect the rights of all people involved. While you are taking this course, you can expect to look more into the laws and regulations associated with performing searches on digital devices, as well as the regulations associated with consent and retrieval. You can review laws regarding search warrants and how to obtain them, as well as proper gathering methods for evidence received during the search process.

Malware Forensics

The increased use of technology in the U.S. may make it necessary for you to consider both the good and the bad implications of computer information systems. Malware can be a destructive resource for criminals interested in a wide variety of illegal activities. It may be up to you as a forensic specialist to identify this type of software and provide safeguards against it. Part of this course may include a look into some of the historical forms of malware and leading into some of the most recent and advanced forms of malware. The goal of this course is to introduce you to malware from a progressive standpoint and provide you with the tools to search for, analyze, and prevent malware attacks.

Digital Forensics Investigation Techniques

At the onset of this course, you can indulge in the benefits of digital forensics investigation techniques during the investigation of criminal behavior. From that point, you may take on learning about the different types of methods that can be useful in locating evidence in digital or electronic devices, proper collection regulations, and methods for uncovering hidden or encrypted information within a computers operating system. These tools can assist you in providing a more thorough investigation of the systems you may be processing.

What will I learn in this online Cyber Security degree program?

Your curriculum focuses on operating systems, computer architectures, networking protocols and security basics. After graduation, you will possess the knowledge to analyze the role of security within an organization, as well as educate employees within the business about their security responsibilities. Plus, you’ll be prepared to sit for industry-standard certifications in Network+, Security+ and CISSP, where otherwise qualified.

Note: Grantham cannot guarantee successful completion of those exams. In some cases, field experience and/or background checks may be necessary to be eligible to take or successfully pass the exams.

How long is this online Cybersecurity bachelor’s degree program?

At 120 credit hours, your accredited online cyber security degree program is designed to be completed in 38 months. It could take less time depending on how much transfer credit you receive and how many classes you take every term.

How much will the Cyber Security online degree program cost?

The undergraduate rate is $295 per credit hour. This rate may be lower if you’re a member of the military, a veteran or part of a military family. Additionally, University of Arkansas Grantham offers scholarships and financial aid for students who qualify.

ONLINE CYBER SECURITY DEGREE START DATE

Courses begin monthly, so you may start whenever you are ready.

Call us at (888) 947-2684 to learn more about our accredited degree programs, financial assistance opportunities or enrollment process.

Cyber Security (Bachelor of Science)

Online Cyber Security Degree Program Outcomes

What is cybersecurity? After successfully completing these cyber security degree programs, you will be able to:

  • Apply knowledge of computing and mathematics appropriate to the discipline
  • Analyze a system, and identify and define the security risks and requirements for secure operation
  • Design, implement and evaluate a computer-based system, process, component or program to meet security needs
  • Address professional, ethical, legal, security and social issues and responsibilities
  • Communicate effectively with a range of audiences
  • Analyze the local and global impact of computing on individuals, organizations and society
  • Recognize the need for and an ability to engage in continuing professional development
  • Use current techniques, skills and tools necessary for computing security practice
  • Identify and analyze security risks of an information system
  • Develop security and recovery policies appropriate to an information system

Cyber Security Core Professional Competencies

University of Arkansas Grantham prepares students to succeed in a diverse array of professional and civic settings by incorporating the following critical life skills into the curriculum:

  • Communication – Formulating and expressing thoughts and ideas effectively using oral, written and non-verbal communication skills in person, in writing and in a digital world.
  • Distributed Collaboration – Working effectively across distributed locations and asynchronously to achieve a common goal through relationship-building, shared responsibility, empathy and respect.
  • Professional and Social Responsibilities – Engaging in social responsibility through seeking justice, valuing diversity, respecting the environment; demonstrating professionalism through integrity, mutual accountability and ethical behavior. This includes considering the social and global impact of individual and organizational decisions and an awareness of and adherence to regulations, professional standards and industry best practices.
  • Critical thinking/problem solving – Using analytical reasoning when gathering and evaluating relevant information to effectively formulate possible solutions for an issue, problem or a variety of issues. This includes the ability to recognize potential consequences of a decision.
  • Data Aptitude - Developing information literacy and the capacity to manage data with subsequent finding, structuring, evaluating and interpreting in order to provide meaningful analysis to accomplish a specific purpose.

Cyber Security (Bachelor of Science)

ONLINE CYBER SECURITY DEGREE CURRICULUM

University of Arkansas Grantham’s 100% online coursework is designed to help you prepare for success in your career. While enrolled in the online cyber security degree program, your curriculum will look like this:

PROGRAM SNAPSHOT:
Program Core Credits: 52
General Education Core Credits: 43
Electives Credits: 25
Total Credit Hours: 120
Accreditation(s): DEAC
Program Core: 52
Course: Title: Credits:
Course: CS340 Title: Operating Systems Credits: 3
  This course introduces operating system fundamentals and compares a variety of operating systems. Servers and networking basics are included.
Course: CS386 Title: Systems Architecture Credits: 4
  This course provides technical knowledge of computer hardware and system software. The material covered in the course presents the background needed for systems analysis, design, configuration, procurement and management.
Course: IS211 Title: Introduction to Information Systems Security Credits: 3
  This course provides a broad overview of the principles, policies and technologies for securing computer and information systems. Topics include a survey of computer system vulnerabilities, cryptographic techniques, access control policies and mechanisms, qualitative and quantitative risk assessment and management, and the implications of security technology in the realm of risk management. Designing and implementing computer security policies and standards, formulating contingency plans and analyzing system security architectures, as well as compliance and ethics are examined.
Course: IS216 Title: Computer Networks Credits: 3
  This course covers fundamental, vendor-independent networking concepts. The course is aligned with the CompTIA Network+ certification exam. Various tools are used to analyze networks.
Course: IS242 Title: Management Information Systems Credits: 3
  This course covers the principles of managing information systems in the context of an enterprise. Topics include coverage of information technology in management, information systems in decision-making, planning of information systems, systems development, controls and security measures, and electronic commerce.
Course: IS311 Title: Security Operations Credits: 3
  This course covers the principles and practices of secure operation and management of information systems. Principles and practices of analysis and monitoring of systems security are also addressed.
Course: IS316 Title: TCP/IP Credits: 3
  This course provides a comprehensive, hands-on look at TCP/IP. Coverage includes the latest TCP/IP stack, as well as SMTP and IPv6. Practical skills are learned with hands-on projects using various tools.
Course: IS320 Title: Database Applications Credits: 3
  This course presents the fundamental concepts of database systems. The course covers the relational model, structured query language (SQL), data modeling, database design and database administration.
Course: IS336 Title: Systems Analysis and Design Credits: 3
  This course introduces the concepts, tools and techniques used in the analysis, design and deployment of information systems which support business requirements. Topics include requirements determination, data and process modeling, various development methodologies, project management, data and user interface design, security, implementation and maintenance, and documentation.
Course: IS355 Title: Risk Management Credits: 3
  This course provides a comprehensive review of industry approaches, practices and standards on how to handle risks to organizations' business-critical assets. Topics include identifying and analyzing threats, qualitative versus quantitative risk management, standards and processes to mitigate risk, risk control and risk policy. Through a practical approach, this course explores key topics that enable students to uncover and remediate potential infractions.
Course: IS360 Title: Disaster Recovery Credits: 3
  This course provides a comprehensive overview of disaster recovery and countermeasures for networks and businesses. Assess risks in the enterprise, determine critical business components, develop an enterprise disaster recovery system, and develop disaster policies, procedures, departmental roles and communication processes for enterprise network. It will provide a foundation in disaster recovery principles, including preparation of a disaster recovery plan, assessment of risks in the enterprise, development of policies, and procedures, and understanding of the roles and relationships of various members of an organization, implementation of the plan, and recovering from a disaster. Learn how to create a secure network by putting policies and procedures in place, and how to restore a network in the event of a disaster. Produce a disaster recovery document of procedures and policies to implement training, testing and rehearsal of a disaster recovery.
Course: IS411 Title: Network Security Credits: 3
  This course introduces the techniques, methodologies and tools used in building and maintaining secure networks. Lab exercises address assessing protocol, network and code vulnerabilities. The course is aligned with the CompTIA Security+ certification examination.
Course: IS440 Title: Human Decision and Security Engineering Credits: 3
  Providing an exploration of the human aspects of Cybersecurity, this course will educate students on human motivation and interaction, how security controls may be bypassed by a person's intentional or unintentional acts, and methods for reducing the cyber risks associated with people. Topics include human behavior and interaction, motivation and influence, and social engineering. Emphasis is on the human element of cyber incidents in relation to protecting information and technology assets.
Course: IS450 Title: Security Trends and Legal Issues Credits: 3
  This course examines the legal environment pertinent to security professionals. Topics include the role of government, relevant civil and criminal law, constitutional rights and privacy issues, intellectual property, and compliance. In addition, current trends in cybersecurity are explored.
Course: IS461 Title: Cryptography Credits: 3
  This course explores the ways in which cryptography can be used to protect communications traffic and sensitive data. Course topics include symmetric vs. asymmetric (public-key) ciphers; hash algorithms; message authentication codes; mathematical underpinnings of cryptography; cryptanalysis; public-key infrastructure; and implementation trade offs. Students gain hands-on experience in state-of-the-art technologies through completion of weekly lab exercises. The primary focus of the course is on building critical-thinking and problem-solving skills.
Course: IS471 Title: Computer Forensics Credits: 3
  This course explores the methods and tools utilized for collecting and preserving electronic digital evidence for the computer forensic process. Topics include the forensic examination, crime categories, analysis, laws governing forensics and report writing. Experience with forensics tools and techniques are provided.
Course: IS499 Title: Security Capstone Credits: 3
  This course provides an integrative experience in the cyber security program through a review and integration of the major security domains. Building on coursework in the program, current trends and a comprehensive view of the field are used to provide a framework for the assessment, interpretation, and evaluation of security scenarios. A broad review of the materials that were presented within the program will be covered through hands-on experiences. A term-long project is a final deliverable of the course.
General Education: 43
Course: Title: Credits:
Course: English Composition Credits: 6
Course: EN261 Title: Fundamentals of Technical Writing Credits: 3
  This course introduces students to terms, concepts, and documents related to Technical Writing (writing in the work environment). The concepts and skills presented in the course are intended to be a foundation for effective writing that combines content and format with knowledge of the target audience. Technical writing covers many document types; the course will provide an overview of documents used in the work place such as visual elements, instructions, reports, and presentations. Students will create a portfolio of technical writing documents including: a proposal, progress reports, feasibility and recommendation reports, visual elements, and descriptions of a mechanism and a process.
Course: Math Credits: 12
Course: MA105 Title: College Algebra Credits: 3
  This course is an introduction to the fundamental concepts of algebra. Topics include equations, polynomial and rational functions and graphing and exponential and logarithmic functions. A new textbook may be required in order to ensure needed electronic codes are valid.
Course: MA141 Title: Precalculus Credits: 3
  This course further develops the skills acquired in algebra and trigonometry and prepares students for calculus. Topics include factorization, powers and exponents, radicals, quadratic equations, inequalities and absolute value, progressions, graphing and an introduction to limits and basic trigonometry.
Course: MA230 Title: Mathematical Statistics I Credits: 3
  This course presents methods in making analytical decisions using statistics. The course focuses on the characteristics of numerical and categorical data, methods of presentation, and descriptive statistics. The course also introduces students to basic methods of sampling and of making inferences using one or two independent samples. NOTE: Credit may not be awarded for both MA215 and MA230.
Course: Natural/Physical Science Credits: 3
Course: Computer Science Credits: 7
Course: CS192 Title: Programming Essentials Credits: 3
  This course introduces problem-solving concepts needed for programming. It covers fundamental control structure such as the sequential structure, the selection structure and the repetition structure. The use of logic in designing programs has general application.
Course: CS200 Title: Programming in Java Credits: 4
  This course is devoted to object-oriented programming using Java. Topics include object-oriented programming, classes and instances, looping, arrays, flow control, packages, interfaces, streams, files, Java applet programming and applying advanced graphical user interface elements.
Course: Oral Communication Credits: 3
Course: Humanities and Fine Arts Credits: 3
Course: Social/Behavioral Science Credits: 6
Course: General Education Credits: 3

You may substitute CS265 - Programming in C++ for CS200.
Choose one of the following for the Program Core: 3
IS351,IS475,IS481
IS211 and IS216 must be passed with a "C" or better in order to complete this program.